Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 2
A Text Filter Method against Chinese Vicious-topic Information
SUN Deng-lin;LI Sheng-hong;JING Tao;LIU Gong-shen
..............page:92-93,96
Detection of Audio Forgeries Based on Bispectral Analysis
GAO Yang;HUANG Zheng;XU Che;SHI Shao-pei;YANG Xu
..............page:94-96
Reconfigurable Design and Implementation of Modulo Multiplication
LI Jun;LV Yong-qi
..............page:97-99
A New Model of Security Auditing System
YANG Zhi-wei
..............page:89-91
Research on IPSec Anti-Replay's Influence Network QoS
ZHOU Jun
..............page:86-88,91
Research on Optimum Test of S-boxes in Rijndael
WANG De;SUN Shi-liang
..............page:84-85
Design of Password Authenticated Key Exchange Protocol
Song Yu-bo;Chen Kai-zhi;Wu Ya-jun
..............page:81-83
Evaluation System for Network Attack Effect Based on IDS
LI Qin;ZENG Fan-ping;LI Ling;YIN Kai-tao
..............page:79-80,83
DoS Attack by Defect of authentication in Mobile IP and its Prevention
XU Yan;WANG Wen-sheng
..............page:76-78
Application of Mesh Security Association in WLAN Mesh Networks
SUN Hao;WU Yue
..............page:73-75
Escorting IT Application, Convoying Service Security
LV Ming
..............page:44-45
PCI Standard and Its Application Situation Analysis
LIU Yan
..............page:38-40
Guaranteeing the Security of "Digital Petroleum"
BAI Jie
..............page:32-34
Focus on Changeable Situation in Antivirus Field
HU Yiao-he;LI Xue;BAI Jie;CUI Guang-yao
..............page:6-27
Planning Lies With Man and With Plan for Man
CUI Guang-yao
..............page:1
Industry Events
..............page:3-4
Research and Implementation of Security Management Technology in Classified Network
ZHAI Jian-hong;ZHANG Yue;LIU Ya-wei
..............page:70-72
A Method of Detecting the Handler on DDoS Attacks
CHONG Ling-zi;YANG Mu-qing;JIAO Bian-bian
..............page:68-69
Design on Combination System of Distributed Firewall and Invading Detection
SHI Li-li;XUE Zhi;WANG Yi-jun
..............page:65-67
Optimizing Method of Weight in Information Security Risk Assessment
ZHOU Ying;QU Hai-peng;FENG Qing-yun;GUO Zhong-wen
..............page:63-64,67
A Trust Management Model based on Bayesian Network
GUO Xiao-qiong;GUAN Hai-bing
..............page:61-62
Security Analysis of IHO Data Protection Scheme
GONG Jie-zhong;CHEN Gong-liang;XU Heng;XIE Xiao-ning
..............page:59-60
The Interference Study of Wireless Network Technology in Digital Home
WANG Bin;TIAN Sen-ling;CHEN Hui-juan
..............page:56-58